Archive | Network Hacking




Pulled Pork – Suricata & Snort Rule Management

Pulled Pork is a PERL based tool for Suricata and Snort rule management – it can determine your version of Snort and automatically download the latest rules for you. The name was chosen because simply speaking, it Pulls the rules. Using a regular crontab you can keep your Snort or Suricata rules up to date […]

Tags: , , , , , , ,

Posted in: Countermeasures, Network Hacking, Security Software | Add a Comment

PyExfil – Python Data Exfiltration Tools

PyExfil started as a Proof of Concept (PoC) and has ended up turning into a Python Data Exfiltration toolkit, which can execute various techniques based around commonly allowed protocols (HTTP, ICMP, DNS etc). The package is very early stage (alpha release) so is not fully tested, any feedback and commits are welcomed by the author. […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Netdiscover – Network Address Discovery Tool

Netdiscover is a network address discovery tool that was developed mainly for those wireless networks without DHCP servers, though it also works on wired networks. It sends ARP requests and sniffs for replies. Built on top of libnet and libpcap, it can passively detect on-line hosts, or search for them, by actively sending ARP requests, […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Censys – Public Host & Network Search Engine

Censys is a public host & network search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet. Driven by Internet-wide scanning, Censys lets researchers find specific hosts and create aggregate reports on how devices, websites, and certificates are configured and deployed. Censys collects data on hosts and […]

Tags: , , , , , , ,

Posted in: Network Hacking, Privacy | Add a Comment

UK Teen Earned More Than US$385,000 From DDoS Service

Another DDoS service down after the owner got busted, this time a UK teenager who created the service called Titanium Stresser when he was just 15. Not long ago we wrote about the two Israeli guys who got busted for running the VDoS-s.com DDoS Service. There seems to be a bit of a crack down […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Network Hacking | Add a Comment

Snort – Free Network Intrusion Detection & Prevention System

Snort is an open-source, lightweight, free network intrusion detection system (NIDS) software for Linux and Windows to detect emerging threats. It’s capable of of performing real-time traffic analysis and packet logging on IP networks. It can perform protocol analysis, content searching/matching, and can be used to detect a variety of attacks and probes, such as […]

Tags: , , , , , , ,

Posted in: Countermeasures, Network Hacking, Security Software | Add a Comment

Advanced IP Scanner – Fast Lightweight Free Windows Port Scanner

Advanced IP Scanner is a reliable and free Windows port scanner to analyse members of a LAN. The program shows all network devices, gives you access to shared folders, provides remote control of computers (via RDP and Radmin), and can even remotely switch computers off. It is easy to use and runs as a portable […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

The Dyn DNS DDoS That Killed Half The Internet

Last week the Dyn DNS DDoS took out most of the East coast US websites including monsters like Spotify, Twitter, Netflix, Github, Heroku and many more. Hopefully it wasn’t because I shared the Mirai source code and some script kiddies got hold of it and decided to take half of the US websites out. A […]

Tags: , , , , , , , ,

Posted in: General Hacking, Network Hacking | Add a Comment

Zenmap – Official Cross-Platform Nmap GUI

Zenmap is the official Nmap GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. No frontend can replace good old command-line Nmap. The nature of a frontend is that […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

mitmproxy – Intercepting HTTP Proxy Tool aka MITM

mitmproxy is an interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers. It’s a console tool that allows interactive examination and modification of HTTP traffic. It differs from mitmdump in that all flows are kept in memory, which means that it’s intended for taking and manipulating small-ish samples. The command-line companion called mitmdump […]

Tags: , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·